Experiences with developing a computer security information assurance curriculum

  • Authors:
  • Thomas Bacon;Rahul Tikekar

  • Affiliations:
  • Department of Computer Science, Southern Oregon University, Ashland, OR;Department of Computer Science, Southern Oregon University, Ashland, OR

  • Venue:
  • Journal of Computing Sciences in Colleges
  • Year:
  • 2003

Quantified Score

Hi-index 0.01

Visualization

Abstract

Attacks on the computing infrastructure have gained prominence as the world harnessed the business transaction capability of the Internet in the last few years. Denial of service attacks and viruses cripple systems, making them unavailable to users and often destroying data. Information theft allows the thief to assume false identities, steal trade secrets and classified information, and perform transactions with accounts owned by others. There is a shortage of skilled computer security professionals capable of reducing vulnerabilities in computing systems.This paper describes the process of creating a computer security and information assurance (CSIA) curriculum Bachelors degree. The process begins with determining goals, followed by developing a plan of action and ends with determining a curriculum consisting of new computer science and interdisciplinary synthesis courses.